CVE-2024-45068

7.1 HIGH

📋 TL;DR

This vulnerability allows attackers to leak authentication credentials from Hitachi Ops Center Common Services and OVA deployments. Attackers could potentially gain unauthorized access to sensitive management systems. Organizations using affected versions of Hitachi Ops Center are at risk.

💻 Affected Systems

Products:
  • Hitachi Ops Center Common Services
  • Hitachi Ops Center OVA
Versions: Hitachi Ops Center Common Services: 10.9.3-00 through 11.0.2-00; Hitachi Ops Center OVA: 10.9.3-00 through 11.0.2-00
Operating Systems: Virtual Appliance
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using affected versions are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain administrative credentials and gain full control over Hitachi Ops Center, potentially compromising managed storage infrastructure and sensitive data.

🟠

Likely Case

Attackers gain access to management interfaces, allowing them to view configuration data, modify settings, or disrupt operations.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the management plane without affecting production storage systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires some knowledge of the system but no authentication. CWE-1392 indicates use of default credentials, hard-coded credentials, or insecure credential handling.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Hitachi Ops Center Common Services 11.0.3-00 or later; Hitachi Ops Center OVA 11.0.2-01 or later

Vendor Advisory: https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-149/index.html

Restart Required: No

Instructions:

1. Download the latest version from Hitachi support portal. 2. Follow Hitachi's upgrade documentation for your deployment type. 3. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to Hitachi Ops Center management interfaces to trusted administrative networks only.

Credential Rotation

all

Change all administrative credentials used by Hitachi Ops Center components.

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure
  • Monitor authentication logs for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check the version in Hitachi Ops Center web interface under Administration > System Information

Check Version:

Check via web interface or consult Hitachi documentation for CLI commands

Verify Fix Applied:

Confirm version is 11.0.3-00 or later for Common Services, or 11.0.2-01 or later for OVA

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts
  • Credential-related errors
  • Access from unexpected IP addresses

Network Indicators:

  • Unusual traffic patterns to management interfaces
  • Credential-related protocol anomalies

SIEM Query:

source="hitachi-ops-center" AND (event_type="authentication" OR event_type="credential")

🔗 References

📤 Share & Export